Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Tanium: Taking A Deeper Cut At Converged Endpoint Management

Tanium’s Chris Hallenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.

DARKReading
#vulnerability
Pentera Helps Enterprises Reduce Their Security Exposure

Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.

Cisco: All Intelligence is Not Created Equal

Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.

Identity Security Pain Points and What Can Be Done

Replacing passwords is not as easy as people think, but there is hope.

How Qualys Reduces Risk and Enables Tool Consolidation

Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.

Expiring Root Certificates Threaten IoT in the Enterprise

What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.

Mimecast: Mitigating Risk Across a Complex Threat Landscape

Garret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since cloud services often add complexity.

Banyan Recommends Phased Approach When Introducing Zero Trust

Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.

DeepSurface Adds Risk-Based Approach to Vulnerability Management

DeepSurface’s Tim Morgan explains how network complexity and cloud computing have contributed to the challenge, and how automation can help.

The HEAT Is On, Says Menlo Security

Neko Papez, senior manager, cybersecurity strategy for Menlo Security, helps customers understand if they’re vulnerable to highly evasive adaptive threats (HEAT).